FacebookTwitterGoogle+RedditEmail

As the Surveillance Expands, Best Way to Resist is to Bury the NSA in Garbage

Word that Yahoo! last year, at the urging of the National Security Agency, secretly developed a program that monitored the mail of all 280 million of its customers and turned over to the NSA all mail from those who used any of the agency’s thousands of keywords, shows that the US has become a total police state in terms of trying to monitor every person in the country (and outside too).

With the courts, especially at the appellate and Supreme Court level, rolling over and supporting this massive evisceration of basic freedoms, including the First Amendment guarantee of freedom of speech and the Fourth Amendment protection against illegal search and seizure and invasion of privacy, perhaps the best way for us to fight back is to overload the spy system. How to do this? Just copy and paste random fragments of the following list (a bit dated, but useable), provided courtesy of the publication Business Insider, and include them in every communication — email, social media, etc. — that you send out.

The secret Yahoo! assault (reported on here by Alfredo Lopez in yesterday’s article), works by searching users’ emails for keywords on an NSA list of suspected words that might be used by alleged terrorists or anti-government activists, and then those suspect communications are forwarded to the NSA, where humans eventually have to separate the wheat from the chaff. Too much chaff (and they surely have too much chaff anyhow!) and they will be buried with work and unable to read anything.

In fact, critics of the government’s metastasizing universal surveillance program, including former FBI agents and other experts, have long criticized the effort to turn the US into a replica of East Germany with its Stazi secret police, cannot work and is actually counter-productive, because with spy agencies’ limited manpower looking at all the false leads provided by keyword monitoring, they are bound to miss the real dangerous messages. In fact, this was also the argument used against the FBI’s program of monitoring mosques and suspecting every Muslim American who expressed criticism of the US. Most are just people saying what a lot of us say: that the US wars in the Middle East are wrong or even criminal, but they are just citizens or immigrants exercising their free speech when they do this, not terrorists, and spying on them is and has been a huge waste or time and resources.

So, to help destroy the continuing and expanding effort to monitor everything we do, here’s a sample of the NSA’s keyword list:

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

***

 You’ll note, if you read through it, that the list itself is doing the job of overburdening the NSA’s staff. By including such commonly used words as flu, package, face, niche, package, credit card, fraud, basement, veggie (!), president, freedom (!), bank and Armani, they assure that there will be endless piles of communications that are completely innocuous that will have to be first read and examined for signs of terrorism. You’ll note too that there are some keywords that are even misspelled, meaning that the real words will be missed, for example: assassinate, priavacy(!), Secert Service and Hillal (is that supposed to be halal or Hillel I wonder?).

It’s also interesting to discover among the incriminating words that the NSA thinks might be used by potential “terrorists,” peculiar words like: freedom, veggie, sardine, Standford (sic), advisors, halibut, fish, Bubba the Love Sponge (really!), Playboy, dictionary and Zen (I’m sure there’s a great SNL skit in the works featuring a gang of Zen practitioners plotting their first terrorist action!).

Anyhow, have fun reading the list and selecting some of these choice keywords to sprinkling into your communications. Or you could just use them as a tag line to your emails, the way some people add inspirational sayings from the likes of Ben Franklin or Albert Einstein. Since the keyword list is so inclusive, you’re probably having your mail reviewed anyway, but why not make sure it is, just to keep the NSA occupied.

More articles by:

Dave Lindorff is a founding member of ThisCantBeHappening!, an online newspaper collective, and is a contributor to Hopeless: Barack Obama and the Politics of Illusion (AK Press).

Weekend Edition
July 13, 2018
Friday - Sunday
Brian Cloughley
Lessons That Should Have Been Learned From NATO’s Destruction of Libya
Paul Street
Time to Stop Playing “Simon Says” with James Madison and Alexander Hamilton
Jeffrey St. Clair
Roaming Charges: In the Land of Formula and Honey
Aidan O'Brien
Ireland’s Intellectuals Bow to the Queen of Chaos 
Michael Collins
The Affirmative Action Silo
Andrew Levine
Tipping Points
Geoff Dutton
Fair and Balanced Opinion at the New York Times
Ajamu Baraka
Cultural and Ideological Struggle in the US: a Final Comment on Ocasio-Cortez
David Rosen
The New McCarthyism: Is the Electric Chair Next for the Left?
Ken Levy
The McConnell Rule: Nasty, Brutish, and Unconstitutional
George Wuerthner
The Awful Truth About the Hammonds
Robert Fisk
Will Those Killed by NATO 19 Years Ago in Serbia Ever Get Justice?
Robert Hunziker
Three Climatic Monsters with Asteroid Impact
Ramzy Baroud
Europe’s Iron Curtain: The Refugee Crisis is about to Worsen
Nick Pemberton
A Letter For Scarlett JoManDaughter
Marilyn Garson
Netanyahu’s War on Transcendence 
Patrick Cockburn
Is ISIS About to Lose Its Last Stronghold in Syria?
Joseph Grosso
The Invisible Class: Workers in America
Kim Ives
Haiti’s Popular Uprising Calls for President Jovenel Moïse’s Removal
John Carroll Md
Dispatch From Haiti: Trump and Breastfeeding
Alycee Lane
On Heat Waves and Climate Resistance
Ed Meek
Dershowitz the Sophist
Howard Lisnoff
Liberal Massachusetts and Recreational Marijuana
Ike Nahem
Trump, Trade Wars, and the Class Struggle
Olivia Alperstein
Kavanaugh and the Supremes: It’s About Much More Than Abortion
Manuel E. Yepe
Korea After the Handshake
Robert Kosuth
Militarized Nationalism: Pernicious and Pervasive
Binoy Kampmark
Soft Brexits and Hard Realities: The Tory Revolt
Helena Norberg-Hodge
Localization: a Strategic Alternative to Globalized Authoritarianism
Kevin Zeese - Nils McCune
Correcting The Record: What Is Really Happening In Nicaragua?
Chris Wright
The American Oligarchy: A Review
Kweli Nzito
Imperial Gangster Nations: Peddling “Democracy” and Other Goodies to the Untutored
Christopher Brauchli
The Defenestration of Scott Pruitt
Ralph Nader
Universal Voting Dissolves the Obstacles Facing Voters
Ron Jacobs
Vermont: Can It Happen Here?
Thomas Knapp
Helsinki: How About a Fresh START?
Seth Sandronsky
A Fraught Century
Graham Peebles
Education and the Mental Health Epidemic
Bob Lord
How to Level the Playing Field for Workers in a Time of Waning Union Power
Saurav Sarkar
I Got Arrested This Summer (and So Should You)
Winslow Myers
President Trump’s Useful Idiocy
Kim C. Domenico
Outing the Dark Beast Hiding Behind Liberal Hope
CounterPunch News Service
First Big Strike Since Janus Ruling Hits Vermont Streets
Louis Proyect
Survival of the Fittest in the London Underground
David Yearsley
Ducks and Études
FacebookTwitterGoogle+RedditEmail